Sunday, December 23, 2012

The Cool Accessories That You Should Have for Your iPod Touch


We live in a world where technology 
is everything in our everyday lives. 

From work to entertainment, you will see that technology is always present here.

The iPod Touch is more than just a portable multimedia player but it is also a Wi-Fi mobile platform where you will be able to access the internet with the device while inside a Wi-Fi hotspot. In addition to that, this device is also a digital camera that will be able to let you take and store pictures, a time piece, and it is also a personal organizer complete with an interactive calendar.

You will see that there are numerous accessories that go well with the iPod Touch. These accessories can be purchased separately and can greatly enhance the functionality of your Apple iPod Touch. There are quite a lot of genuine Apple iPod Touch accessories that you can choose from and a lot more from third party manufacturers that also offer great accessories for the iPod Touch.

These accessories don't only provide more functionality for the iPod Touch, but it also provides additional entertainment when one uses the device. In fact, some accessories were designed by large electronic manufacturers, such as JBL, Belkin, and Bose to name three of the big companies in the world of audio technology. The accessories they sell for the iPod Touch will be able to enhance the quality of sound.



Minidisc Australia


Some accessories even allow you to listen to AM and FM radio. Others will let you record music and even watch live television. For the athletic person, you will definitely enjoy the Nike+iPod nanometer as this will serve as a great way to measure your progress during your exercise.

For people who love photography, the Apple iPod Touch has accessories that will allow you to connect the iPod Touch directly to the printer in order to print the pictures you take while you are on the go.

However, if you really want the best out of your iPod Touch, then nothing will be able to do it other than purchasing a set of external speakers. This will allow you to share music with other people, which is what iPod Touch is all about. In fact, some speakers produces high quality sound that you can even start a party with just your iPod Touch and its portable speakers. Some speakers have wireless remote controls which will be able to add to your convenience.

Protective cases are also a must have accessory for your iPod Touch. This will be able to protect your iPod Touch from bumps, scratches and other damages.



As you can see, there are quite a lot of accessories available for the iPod Touch. With these accessories, you will be able to maximize the functionality of your iPod Touch as well as maximize your enjoyment with it. So, the next time you plan on buying an iPod Touch, you may want to consider purchasing some of the accessories mentioned to go with it.



Wednesday, December 19, 2012

iPod Touch and the Touch Screen Technology


Today’s electronic market is dominated by Apple and the company has proven its triumph with the introduction of the iPod Touch. Through the years, Apple has maintained the excellence its known for. 


Back in 1997, the classic iPod was first launched in the market. The market was revolutionized upon the entry of the iPod and just over a year ago, the new generation iPods were released. Among all music devices, iPods are deemed the best. In fact, sales records in Europe and the US have reached world records especially with the launching of the new iPod Touch. 


If you love iTunes, you will definitely fall in love with the new iPod Touch because the device can download music tracks directly from iTunes. This feature is possible because the iPod Touch is Wi-Fi capable. The screen is about 3.5 inches and so you can watch videos or movies clearly and vividly. Images come alive because of the iPod’s bright color on a display of 320x480 pixels.

The touch screen technology is also incorporated in the new iPod Touch just like the iPhone. You can even zoom in and out of photos. With a simple scrolling of the fingers, you can scroll through videos, songs, and movies.  With the ease of use of the new generation iPods, many people are yearning to own one.

What are the contents in the box of the iPod Touch? When you purchase a brand new unit of iPod Touch, it is already equipped with a USB2.0 cable, earphones, polishing cloth, dock adapter, and stand. A start guide is also provided so that you can use your new iPod immediately. If you want maximum entertainment, you need to have a computer with internet connection at home. Other requirements include iTunes 7.4 and USB2.0 port. Broadband internet connections are preferred especially if you plan to download videos, music tracks, and movies often.




If you already have an internet connection at home, you can start checking out the website of Apple. By visiting their website, you can get a detailed description of the device. You can also check out its physical features. There are good deals in many major online stores today and by shopping around, you night be able to get a discount (even a small one).

Many people are looking for the new iPod Touch and the sales of the device are soaring high since its launching in September 2007. It even broke the record sales of other music devices. So far, the iPods are the top selling music devices in the market. It’s not only a gadget for listening to music but also for playing games, watching videos and movies.




Saturday, December 15, 2012

Why do People Love iPod Touch?


What’s the best device out in the market so far?

 According to many, the iPod Touch is the best and it has surpassed the demand for the classic iPod or Nano, or even the iPhone. Are you wondering why people love the iPod Touch?

Many individuals now own an iPod Touch and it’s not really a surprise. You see, even older adults love mp3 and mp4 players, iPhones, and other high tech devices; so why not own an iPod Touch? As long as you can afford to purchase this device, you can have it. 

If you plan to give an iPod Touch as a gift, you need to ensure that you give it to someone who’s extra special because this device is quite expensive. It can be a very memorable gift to a loved one.

Today’s environment is very much different from that of long ago. Most people are now enjoying the instant gratification of information, music, movies, videos, applications, iTunes, and the internet. When you have an iPod Touch, it’s like going to your favorite game, CD or DVD store. By just looking at your iPod Touch’s screen, you can already enjoy these things. 




iPod Touch features include:

1. iPod Touch interfaces with the Microsoft Outlook. Some jobs utilize Outlook and having an iPod Touch can be quite handy.

2. Sales people can benefit a lot from the iPod Touch because it has a very useful feature – calculator. Calculating figures is not always easy especially if you’re already dealing with huge amounts.

3. Sellers can also benefit from the iPod Touch because you can store important photos. That way, when your customer wants to see a picture of the product, you can simply show the photo saved in the iPod.

4. If you plan to bring your iPod when you go out, don’t worry because it perfectly fits your pocket.

5. With a simple touch on the screen, you can already maneuver in the different folders and files stored in your iPod; that’s why it is called iPod Touch

6. Another feature of the iPod is the Calendar. You can keep your most important meetings, schedules, and appointments in the calendar and you can even synchronize it with Microsoft Outlook.

7. You can better manage your time with the aid of the iPod Touch. You won’t need to have a record book just to monitor your daily activities at home or in the office.

Many individuals can’t leave their homes without the iPod Touch in their pockets. This is already a proof that so many people love the new iPod. The modern world is changing fast and you can expect more improvements in the coming years. Surely the iPod will become a much better gadget.

Start looking for an iPod Touch now. You can purchase it in major online stores or you can also shop around the stores in your locality. There are already imitations of the iPod so be very careful when purchasing the gadget. You need to ensure that you’re getting a genuine iPod Touch; if you can find a low priced iPod Touch, you’d better think twice because it might be an imitation.

The iPod Touch has definitely hit the market by storm. 
Make sure that you own one now.

 

Thursday, November 29, 2012

Cyber Monday Top Promotions





Microsoft Store is excited to announce their Cyber Monday deals!






 Shop Microsoft for great Cyber Monday deals!

Cyber Monday Top Promotions Include: 

• Save $100 on Acer Iconia for $399 Save $100 on Acer Iconia for $399Save up to 40% on select Xbox Games 

• Save $200 on the Asus Vivobook S400 for $499 Save $200 on the Asus Vivobook S400 for $499 

• Save $250 on the Vizio 14” ultrabook Save $250 on the Vizio 14” ultrabook 

• Save over $100 on the 250GB Kinect Sport Joy Ride Bundle Save over $100 on the 250GB Kinect Sport Joy Ride Bundle 

• Shop the Surface now! Shop for the Surface now!

Monday, November 26, 2012

CCNA questions - Part 12

Another 5 mixed networking Questions to mull over



1. What is the administrative distance of IGRP?

A) 110
B) 1
C) 120
D) 90
E) 100


2. What TCP/IP layer are Telnet, FTP, TFTP and SMTP protocols associated with?

A) Application
B) Host-to-Host / Transport
C) Internet
D) Network Access

3. What determines network addresses when data link addresses are known?


A) Ping
B) ICMP
C) ARP
D) RARP

4. What mode are you in when you see this prompt?
Router(config-router)#

A) user exec mode
B) privileged mode
C) global configuration mode
D) interface configuration mode
E) routing protocol configuration

5. What does Ethernet 0 is up, line protocol is down indicate?


A) Keepalive or framing issue
B) Carrier detect is not present
C) The interface is shutdown


-->

1. Correct Answer: E

IGRP has an administrative distance of 100.

Administrative distance is used by Cisco routers to select the best path when there are two
or more different routes to the same destination from two different routing protocols.
administrative distance defines the reliability of a routing protocol.


2. Correct Answer: A

3. Correct Answer: D

Reverse Address Resolution Protocol (RARP) is used by a host computer to request its IPv4
address from an administrative host, it provides the administrative host with its hardware
address (MAC address).
 

4. Correct Answer: E

Here is a summary of Cisco IOS router command prompts:

Router> - User EXEC mode
Router# - Privileged EXEC mode
Router(config)# - Global configuration mode
Router(config-if)# - Interface level configuration mode
Router(config-router)# - Routing engine level within configuration mode
Router(config-line)# - Line level (vty, tty, async) within configuration mode


5. Correct Answer: A

The various states of an interface:


Ethernet0 is up, line protocol is up - The interface is functioning correctly.

Ethernet0 is down, line protocol is down - This message usually represents a physical
interface problem. The cable may be disconnected. This can also occur if this interface is
connected to another router whose interface has been shutdown.

Ethernet0 is up, line protocol is down - The Physical layer connectivity is not the issue.
The line protocol being down is either a clocking issue (keepalives) or a mismatch of the
frame types being used on connected devices. 


 
  “Successful people are always looking for opportunities to help others. Unsuccessful people are always asking, "What's in it for me?"”

    Brian Tracy 

Monday, November 19, 2012

CCNA Questions - Part 11

Another Batch of Questions to have a look at - enjoy.





1. What WLAN standard operates in the 2.4GHz band with a data rate of up to 11Mbps?

A) 802.11a
B) 802.11b
C) 802.11g
D) 802.11h
E) 802.11n

2. What WLAN standard operates in the 5GHz band with a data rate of up to 54Mbps?

A) 802.11a
B) 802.11b
C) 802.11g
D) 802.11h
E) 802.11n

3. What is the administrative distance of RIP?

A) 110
B) 1
C) 120
D) 90
E) 100

4. What is the maximum number of subnets given the following?

192.168.10.0
255.255.255.192

(Assume ip subnet-zero is enabled)


A) 4
B) 8
C) 16
D) 32
E) 64

5. What IOS command would disable CDP on all interfaces of a Cisco router?


A) no cdp enable
B) disable cdp
C) no cdp
D) no cdp run




1. Correct Answer: B


802.11b is the most widely deployed wireless standard and operates in the 2.4GHz band with
a data rate of up to 11Mbps.

2. Correct Answer: A

802.11a operates in the 5GHz band with a data rate of up to 54Mbps and is immune to
interference from other devices operating in the 2.4GHz spectrum.

3. Correct Answer: C


Here in the question the A is administrative distance 110 for OSPF, B is 1 for Static
Route, D is 90 for Internal EIGRP, E is 100 for IGRP so the last C is 120 for RIP. Here You
must be carefull for Internal and External EIGRP's administrative distance and Internal and
xternal BGP. 

4. Correct Answer: A


192.168.10.0 is a class C address.  The subnet mask 255.255.255.192 implies 2 bits are
borrowed. 22 = 4 subnets

5.Correct Answer: D

no cdp run - When disabling a command you use "no" form of the command 

-->

Sunday, November 11, 2012

Spanning Tree protocol


Span Tree - nothing to do with coconuts...


 1. What does the Spanning Tree Protocol achieve?

A) Determines a loop free topology
B) Sets up a meshed switched topology
C) Creates bridge loops and broadcast storms
D) Disseminates VLAN topology

2. What does the following statement do?Switch(config-if)#spanning-tree portfast disable

A) Disables spanning-tree on the switch port
B) Disable spanning tree on the switch
C) Changes the spanning-tree switch to portfast mode



 

1.  Answer: A
 

2. Answer: A


Portfast is a method of disabling STP on a switch port.


Summary




STP (Spanning Tree protocol) is used at layer 2 to prevent routing loops for frames on switches with multiple connections. Without STP, imagine 2 switches connected together with 2 separate Ethernet cables, a frame passes from one switch to the other over cable number 1. Switch 2 by default sends the frame out all ports except the one it came from so then this same frame is routed back via the second cable to the first switch, first switch then looks at the address and routes the frame back out the first cable to switch 2 and around it goes again. 

This is a routing loop, also known as "race tracking", and the frame will eventually cause the interface buffers on the switches to overflow, causing traffic degradation, increased CPU and ultimately switch crash. 

STP prevents this from happening by blocking ports between switches, allowing traffic to pass over one link only.  It has to be remembered that STP works vlan by vlan, so you can balance traffic across multiple links by the use of weighting, to allow some vlans on one trunk and others on the other.  Very useful protocol.



-->

Monday, November 5, 2012

CCNA Exam Questions Part 10


Another set of Random Nework related questions to mull over - have fun.


1. What effect will the shutdown command have on a Cisco router if you are in the Router(config-if)# mode?


A.) disable the router
B.) disable all inbound traffic
C.) disable the current interface
D.) disable remote access to the router

2. IP and IPv6 and IPX are examples of...

A.) Routing protocols
B.) Routed protocols

3. Cisco Routers are what by default?

A.) DTE devices
B.) DCE devices

4. What would the command copy run start achieve?


A.) Copy the startup configuration to RAM
B.) Copy the running configuration to NVRAM
C.) This is not a correct IOS command

5. If a switch receives a multicast frame, what does it do with it?


A.) Forwards it out every port
B.) Sends it back to the originator asking for a destination address
C.) Drops the frame

6, What is the default setting on a router for the invalid timer if you are using IGRP?


A.) 90 seconds
B.) 30 seconds
C.) 280 seconds
D.) 270 seconds
E.) 180 seconds



Clickbank Products

1. Correct Answer C

disable the current interface

2. Correct Answer B

Routed protocols
ROUTED PROTOCOLS are nothing more than data being transported across the networks.
Eg IP, IPV6 and IPX

ROUTING PROTOCOLS are the software that allow routers to dynamically advertise and learn routes, determine which routes are available and which are the most efficient routes to a destination.
Eg BGP, OSPF, RIP

3. Correct Answer A

DTE devices (Data Terminal Equipment) which basically means they receive or slave off the clock source provided by the carrier Circuit (DCE). Cisco Interfaces can be configured to DCE mode (they supply clock) by adding the Clock rate command.

4. Correct Answer B

Copy the running configuration to NVRAM

5. Correct Answer A

Internally multicast is treated the same as a broadcast. So the Switch will send it to all ports except from which it was recieved. Same way it will treat a broadcast.

6.  Correct Answer: D

IGRP sends its routing table to its neighbors every 90 seconds. IGRP uses an invalid timer to mark a route as invalid after 270 seconds (three times the update timer). IGRP uses a flush timer to remove a route from the routing table (default flush timer is 630 seconds, seven times the update period).

 "Man's mind stretched to a new idea never goes back to its
original dimensions."

Gerald Holton


Monday, October 29, 2012

CCNA questions Part 9

Some more random Cisco oriented Networking questions to stimulate the mind - if you're interested in this kind of thing. :-)


1. A CIDR (Classless Inter-Domain Routing) value of /30 equates to what subnet mask?

A.) 255.255.255.253
B.) 255.255.255.128
C.) 255.255.255.248
D.) 255.255.255.252


2. Your network features a combination of Cisco, 3COM and Netgear switches. You have been tasked to set up VLANS on your switched network. What trunking method should you use?

A.) Inter-Switch Link (ISL)
B.) IEEE 802.1Q
C.) You can't create VLANs by combining switches from different vendors


3. What type of NAT allows you to map multiple unregistered IP addresses to a single registered IP address?

A.) Static NAT
B.) Dynamic NAT
C.) Overloading (Port Address Translation)


4. When STP is converging no data can move through the switched network.

A.) True
B.) False


5. What is the encapsulation type of Transport Layer?

A.) Segments
B.) Packets
C.) Frames
D.) Bits



Clickbank Products


1. Correct Answer D

255.255.255.252 = /30

Classless Inter-Domain Routing is based on variable-length subnet masking (VLSM), which allows a network to be divided into variously sized subnets, providing the opportunity to size a network more appropriately for local needs

2. Correct Answer B

IEEE 802.1Q is the VLAN standard on all network devices, ISL is a cisco proprietary protocol.

3. Correct Answer C

Port Address Translation (PAT), or Overloading,  is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses.

4. Correct Answer A

All ports are in placed in a blocking state while STP converges.

5. Correct Answer A

Segments = Transport Layer
Packets = Network layer
Frames = Datalink Layer
Bits = Physical Layer

"If a man will not work, he shall not eat." - 
2 Thessalonians 3:10

Monday, October 22, 2012

CCNA Questions Part 8


Another set of Random Networking Questions for your learning pleasure.


1. What OSI layer does the following refer to?

"Establishes availability of intended communication partners, establishes agreement on procedures regarding error recovery and data integrity and synchronizes networked applications"


A.) Transport layer
B.) Session layer
C.) Datalink layer
D.) Application layer
E.) Presentation layer


2. In Cisco the running-config is found in the ...

A.) NVRAM
B.) DRAM
C.) FLASH
D.) ROM


3. Where would you place standard access lists?

A) As close to the destination as possible
B) As close to the source as possible


4. How would you copy the IOS to a TFTP server?

A.) Router(config)#copy ram tftp
B.) Router(config)#copy tftp flash
C.) Router#copy flash tftp
D.) Router#copy tftp flash
E.) None of the above

5. What happens if a packet does not match any of an Access Lists (ACL) statements?
 

A.) Nothing
B.) It is rejected
C.) It is allowed


Clickbank Products


1. Correct Answer D

In TCP/IP, the application layer contains all protocols and methods that fall into the realm of process-to-process communications across an Internet Protocol (IP) network. Application layer methods use the underlying transport layer protocols to establish host-to-host connections.

2. Correct Answer A

NVRAM

3. Correct Answer: A

Standard access lists only filter based on source address so they have to be placed as close to the destination as possible.


4. Correct Answer C

Router#copy flash tftp - Cisco IOS is stored in Flash memory on their devices.

5. Correct Answer B

It is rejected because all ACL's by default have an explicit "Deny All" statement at the end, that drops any packet that does not match the list.  This is usually bypassed by adding the "allow any any" statement at the end of the list.


How did you go?  Add a comment if you like - have a great day!

"The larger the island of knowledge, the longer the
shoreline of wonder."

Ralph W. Sockman

Monday, October 8, 2012

CCNA Questions Part 7


Another set of Random Networking Questions to Ponder, Have Fun


1. What will be the IP address of the second subnet given the following?

172.16.0.0
255.255.224.0
(Assume ip subnet-zero is enabled)

A) 172.16.0.0
B) 172.16.8.0
C) 172.16.16.0
D) 172.16.32.0
E) 172.16.64.0


2. What Cisco IOS enhanced editing command end the configuration mode and returns to EXEC?

A.) Ctrl+Z
B.) Ctrl+W
C.) Ctrl+F
D.) Esc+F
E.) Tab


3. What Transport layer protocol are we describing?

"A reliable connection-oriented protocol with flow control"
A.) UDP
B.) TCP


4. What is the IEEE standard describing VLANs called?

A.) IEEE VLAN
B.) 802.3
C.) 802.1q
D.) 802.11b
E.) 802.3q


5. Where is the best position to place an Extended ACL?

A.) As close to the destination as possible
B.) As close to the source as possible


6. What IOS command would you issue in privileged-mode to change the running-config? (Cisco)


A.) config t
B.) config mem
C.) config net
D.) config run





Clickbank Products


1. Correct Answer: D

172.16.32.0
Easy way to get the Block size 256-224 = 32, now count in blocks of 32
First subnet 172.16.0.0 to 172.16.31.255, Second subnet starts 172.16.32.0

2. Correct Answer A

Cisco Keyboard Shortcut Actions 

  • Up Arrow Displays your previous commands.  (command history)
  • TAB Key Completes a partially typed CLI commands.
  • CTRL+Z Takes you back to Privileged EXEC Mode.
  • CTRL+A Places the cursor at the beginning of a line.
  • CTRL+E Places the cursor at the end of a line.
  • CTRL+R Redisplays the current command line.
  • CTRL+W Erases a word (behind the cursor).
  • CTRL+U Erases an entire line.
3. Correct Answer B

Transmission Control Protocol (TCP) provides reliable, ordered delivery of a stream of octets from a program on one computer to another program on another computer.

4. Correct Answer: C

The IEEE 802.1Q standard specifies a standard method for inserting virtual LAN (VLAN) membership tags into Ethernet frames.


5. Correct Answer A

The general rule is to place standard ACLs as close to the destination as possible and to position extended ACLs as close as possible to the source of the traffic that will be denied. This is because extended ACLs can take in to account source and destination addresses as well as port numbers.


6. Correct Answer A

config t (configure terminal)

Extra one this week, Hope you had some success - have a great day.




Monday, October 1, 2012

3 Simple Mindset “Tricks” To Take Consistent Action |


An interesting article worth a look...


CCNA Questions Part 6


Part 6 of the Networking Questions to keep the old Grey matter ticking - enjoy.



1. If I were to give an IP address to VLAN1, then VLAN2, and VLAN3, which VLAN would be the management VLAN? (Cisco)

A.) VLAN0
B.) VLAN1
C.) VLAN2
D.) VLAN_A
E.) VLAN01


2. What layer of the OSI model is responsible for multiplexing upper-layer applications, establishing sessions and tearing down virtual circuits?

A.) Presentation
B.) Session
C.) Transport
D.) Network
E.) Data Link


3. Which of the following commands would correctly add a message of the day banner? (Cisco)

A.) Router(config)#banner #
B.) Router(config)#banner motd #
C.) Router#banner motd #
D.) Router#banner #


4. Triggered updates are used to speed the routing protocol convergence process?

A.) True
B.) False


5. What is the reserved address space for a Class B IPV4 network?

A.) 10.0.0.0 - 10.255.255.255
B.) 20.0.0.0 - 20.255.255.255
C.) 172.16.0.0 - 172.31.255.255
D.) 192.168.0.0 - 192.168.255.255
E.) 208.168.0.0 - 208.168.255.255





Clickbank Products


1. Correct Answer: B

VLAN1 is a management VLAN and by default all ports on a switch are members of VLAN1.  Cisco recommends that you use VLAN1 for administrative purposes only, also note you can't change the name of VLAN1.


2. Correct Answer: C

In computer networking, the transport layer or layer 4 provides end-to-end communication services for applications within a layered architecture of network components and protocols. The transport layer provides services such as connection-oriented data stream support, reliability, flow control, and multiplexing.

3. Correct Answer: B
 

A Basic Example of the Command sequence is as follows:

Router>enable
Router>Password:cisco
Router#configure terminal
Router(config)#hostname London
London(config)#banner motd #welcome#
London(config)#exit

4. Correct Answer A

A triggered update is sent immediately in response to a change in the network (e.g. A link going down). The router detecting the change immediately sends an update message to its adjacent routers, which then generate their own triggered updates. This process continues until the network converges. Triggered updates occurs independently from the regular routing updates and are intended to speed the convergence process.


5. Correct Answer C

172.16.0.0 - 172.31.255.255

How did you go? Leave a comment if you disagree or have any questions - have a great day.

 "Hard work often leads to success. 
No work seldom does."
  --Harvey Mackay


Monday, September 24, 2012

CCNA Questions Part 5


More Questions for those interested in all things network. Enjoy


1. Trunk links are used to communicate between...

A) Two switches
B) A switch and router
C) A switch and server
D) A switch and PC
E) A, B and C are correct


2. What are the 3 ways of assigning a switched port to VLANs?

A) Switch-centric, Port-centric, Dynamic VLANs
B) Port-centric, Static VLANs, Dynamic VLANs
C) Interface-based, Static VLANs, Dynamic VLANs


3. Which of the following could be a valid MAC address?

A) 00-08-74-CE-B7-90
B) 192.168.0.1
C) FFFF.FFFF.FFFF.FFFF
D) 255.255.255.240


4. What is the invalid timer set to by default when you have a router running the Interior Gateway Routing Protocol? (IGRP)

A.) 3 times the update period
B.) 270 seconds
C.) 3 times the update period + 10 seconds
D.) Answer A and B
E.) 7 times the update period


5. Which protocol is used to determine the IP address if the MAC address is already known?

A.) ARP
B.) RARP
C.) IP
D.) IPX
E.) TCP




Clickbank Products

1. Correct Answer: E

A trunk link is a point-to-point link between two switches, a switch and router or a switch and server which carries multiple VLAN traffic.


2. Correct Answer: B

3 ways of assigning a switched port to VLANs:

  • Port-Centric - All nodes connected to ports in the same VLAN are assigned to the same VLAN ID.
  • Static VLANs - Statically assign ports to a VLAN.
  • Dynamic VLANs - Ports that can automatically determine their VLAN assignments based on MAC addresses
3. Correct Answer: A

The standard format for printing MAC addresses is six groups of two hexadecimal digits, separated by hyphens (-) or colons (:) e.g. 00-08-74-CE-B7-90, 00:08:74:CE:B7:90.
Another convention commonly used is three groups of four hexadecimal digits separated by dots e.g. 0573.4567.19ab.


4. Correct Answer: D

IGRP sends its routing table to its neighbors every 90 seconds. IGRP uses an invalid timer to mark a route as invalid after 270 seconds (three times the update timer). IGRP uses a flush timer to remove a route from the routing table (default flush timer is 630 seconds, seven times the update period).


5. Correct Answer B

Reverse Address Resolution Protocol (RARP) is a networking protocol used by a host computer to request its IP address from an administrative host, when it knows its MAC address.





If you don't like something, change it. 
If you can't change it, change your attitude. 
Don't complain. - Maya Angelou



Monday, September 17, 2012

CCNA questions part 4


Another set of Questions for those interested in networking - enjoy!


 
1. What is the correct sequence of Spanning Tree Port states?

A) Blocking, Listening, Learning, Forwarding, Disabled
B) Disabled, Blocking, Listening, Learning, Forwarding
C) Learning, Listening, Forwarding, Disabled, Blocking
D) Listening, Learning, Forwarding, Blocking, Disabled

2. In a directed broadcast all host bits set to 1 received by all hosts on local broadcast domain?

A) True
B) False


3. What type of IP address has the following structure?

network.node.node.node

A.) Class A
B.) Class B
C.) Class C


4. What is the default time BPDUs are sent and received by switches?

A) 2 seconds
B) 10 seconds
C) 30 seconds
D) 60 seconds

5. How would you view the current Configuration Register value?
(Cisco Router)

A.) show config-register
B.) show reg
C.) show config
D.) show version





Clickbank Products

1. Correct Answer: A

Explanation
STP switch port states:

  • Blocking
  • Listening
  • Learning
  • Forwarding
  • Disabled
2. Correct Answer: A

A directed broadcast address for each physical network has all ones in the host ID part of the address. The network ID and the subnet ID must be valid network and subnet values. A directed broadcast is sent to every host on that network or subnetwork.


3. Correct Answer A

Class A Address in IPV4


4. Correct Answer: A

2 seconds
Part of the Spanning tree Protocol (STP)- Bridges and Switches use special data frames called Bridge Protocol Data Units (BPDUs) to exchange information about bridge IDs and root path costs.   

5. Correct Answer: D
 
You can see the current value of the configuration register by using the show version command.
 

Ahh threw in a D in there to see if you where paying attention :-) 
- have a great day!

Thursday, September 13, 2012

Cisco Exam Revision Tips





Here are some revision tips to help you 
                           revise for the CCNA exam.

1.)  Make sure you only learn topics which are covered by the exam.

2.)  Glance through the course/exam topics and highlight the areas you think you'll need to concentrate on more.


3.)  Get a good CCNA book that suits your learning style.


4.)  Practice what you learn frequently by using practice tests and flash cards. Highlight your weakest subjects and aim to improve them.


5.)  Create a set of revision notes for each topic. Try to stick to one page of paper per topic.


6.)  Read through your revision notes frequently.


7.)  You want to retain the information beyond the exam, so forget about cramming the night before the exam. Spread out your revision into 30 minute revision periods.


8.)  Condense your revision notes. The act of rewriting them will help you memorize them.


9.)  Practice your IOS configuration on a Cisco router or router simulator.



From my experience it is best to read twice, answer once.  Good Luck in your endeavours.


Monday, September 10, 2012

Tips To Secure Your Wireless


Wireless network technology has become common place in our daily lives, and we are beginning to find wireless networks available almost everywhere we go.  We can find free wireless networks available at our local coffee shops, fast food restaurants, office supply stores and even while you wait to get your car’s oil changed.   Take into account that WiFi is built into many of our consumer gadgets, we can consume digital information virtually everywhere we go.  With that said, we also need to take precautions in accessing and using these available wireless networks.  Here are a few tips to use wireless network technology safely and security at home and in public places.

Home Wireless tips

  • Secure your wireless network by changing the administrator’s default password on your wireless router.  There are far too many instances where the cable installer or phone technician installs the ISP’s wireless router and the administrator password is never changed.
  • Enable WPA2-Personal with AES encryption.  You should create a pre-shared key (passphrase) with a minimum length of 15 characters.  Length does matter; it is harder to hack a long simple passphrase than a short complex one.
  • Do not name your SSID to easily identify who owns the network (e.g. Jones Family).
  • Hiding your Service Set Identifier (SSID) IS NOT a security measure.  Hidden SSIDs (the wireless network name) are easily identified by freeware applications downloaded from the internet.  Software such as, Kismet or NetStumbler are available for all the major OSes and can quickly identify the SSIDs for nearby wireless networks.  In some instances, hidden SSIDs can actually cause connection problems.


Public Wireless Use Tips:

Whenever you use a public WiFi hotspot, there are two questions you should always ask yourself.
1. “Am I comfortable with someone looking over my shoulder at the information I accessed?” 
2. “Am I comfortable with someone seeing how I accessed that information (by entering my user name and password)?”

When using public WiFi hotspots, you never know if someone sitting near you or across the street has compromised that wireless network, and have the ability to read/capture the data traffic.  You are assuming the provider has implemented and properly configured security protocols to ensure your data privacy.  Maybe they have, and maybe they have not.  That’s why you always need to ask yourself those two questions when using a public WiFi network.

Here are a few tips when accessing and using a public WiFi.

  • I think we all know, DO NOT perform online banking or other financial transactions on a public WiFi hotspot.
  • Have up to date system patches, anti-malware and personal firewall software installed (where applicable).
  • Don’t use the public WiFi hotspot.  If available, use your smart phone‘s hotspot capability or portable hotspot device to provide internet access for your devices.  With the portable hotspot, you control the access security of devices using your wireless network (assuming you actually configure the security features) and have the security of using your mobile carrier’s data network.
  • Invest in a personal VPN service.  There are plenty free and paid VPN services available in the consumer market.

PRIVATE WiFi is a personal VPN that protects the identity and sensitive information of anyone on a public WiFi network by encrypting everything you send and receive with bank-level security.
 

PRIVATE WiFi is the safest way to do everything online. And you can try it for free for 3 days by clicking the link below.



What is a Computer Hacker?

These days, a hacker doesn't have to be a geek from a top university who breaks into high profile banks and government systems.

A hacker can be anyone, even the kid next door. Anyone can download a simple software off the Internet to see everything that goes into, and out of, a computer on a the same network. And people who do this don't always have the best of intentions. So just imagine how exposed you are when you use WiFi in a public hotspot. Everybody in that very same hotspot are all on the same computer network.

Firewalls and anti-virus can't stop this new type of hacking, called sniffing, but PRIVATE WiFi can. Learn more about how to protect yourself against hackers.Private wifi description